5 results (0.005 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a while loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. Se ha detectado un problema en gif2apng versión 1.9. Se presenta un desbordamiento del búfer en la región stack de la memoria que implica un bucle while. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow vulnerability in the DecodeLZW function. It allows an attacker to write a large amount of arbitrary data outside the boundaries of a buffer. Se ha detectado un problema en gif2apng versión 1.9. Se presenta una vulnerabilidad de desbordamiento de búfer en la región heap de la memoria en la función DecodeLZW. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002668 https://lists.debian.org/debian-lts-announce/2022/03/msg00008.html • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow within the main function. It allows an attacker to write data outside of the allocated buffer. The attacker has control over a part of the address that data is written to, control over the written data, and (to some extent) control over the amount of data that is written. Se ha detectado un problema en gif2apng versión 1.9. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002667 https://lists.debian.org/debian-lts-announce/2022/03/msg00008.html • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 1

An issue was discovered in gif2apng 1.9. There is a heap-based buffer overflow in the main function. It allows an attacker to write 2 bytes outside the boundaries of the buffer. Se ha detectado un problema en gif2apng versión 1.9. Se presenta un desbordamiento del búfer en la región heap de la memoria en la función main. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002687 https://lists.debian.org/debian-lts-announce/2022/03/msg00008.html • CWE-787: Out-of-bounds Write •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in gif2apng 1.9. There is a stack-based buffer overflow involving a for loop. An attacker has little influence over the data written to the stack, making it unlikely that the flow of control can be subverted. Se ha detectado un problema en gif2apng versión 1.9. Se presenta un desbordamiento del búfer en la región stack de la memoria que implica un bucle for. • https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1002669 • CWE-787: Out-of-bounds Write •